Teaching Formal Methods in Application Domains A Case Study in Computer and Network Security

被引:0
|
作者
Brucker, Achim D. [1 ]
Marmsoler, Diego [1 ]
机构
[1] Univ Exeter, Dept Comp Sci, Exeter, Devon, England
来源
关键词
Formal Methods and Security; Protocol Verification; OFMC; Research-led Teaching; AUTHENTICATION;
D O I
10.1007/978-3-031-71379-8_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computer science degree. As a consequence, we neither can rely on strong theoretical or mathematical foundations of the students, nor can we focus the whole term on applying formal methods in security. We address these challenges by integrating formal methods into a three-week-long section on security protocols. In these three weeks, we use a holistic approach for teaching the security objectives of security protocols, their analysis of actual implementations using a network sniffer, their formal verification using a model checker (and comparing it to an approach based on interactive theorem proving). Our approach has been proven successful in teaching (both, in-person and remotely) the benefits of formal methods to numerous students. The students do perform well in the corresponding assessments, and each year we are able to attract students for final year projects (i.e., their B.Sc. thesis) in the area of formal methods.
引用
收藏
页码:124 / 140
页数:17
相关论文
共 50 条
  • [31] Application of Computer Information Encryption Technology in Network Security
    Aimait, Aikebaier Jiang
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 32 - 34
  • [32] Agent-based model of computer network security system: A case study
    Gorodetski, VI
    Karsayev, O
    Khabalov, A
    Kotenko, I
    Popyack, LJ
    Skormin, V
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 39 - 50
  • [33] The Application of Computer Information Management Technology in the Network Security
    Zhang, Haicheng
    Zheng, Qun
    Di, Zheng
    2016 3RD INTERNATIONAL CONFERENCE ON MANAGEMENT INNOVATION AND BUSINESS INNOVATION (ICMIBI 2016), PT 2, 2016, 58 : 747 - 751
  • [34] The application of data mining technology in computer network security
    Ma Xiao-li
    Zhang Xiao-lei
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 1126 - 1129
  • [35] Application of DEA Method in Computer Network Security Evaluation
    Yang, Yan-mei
    Zhang, Yan-ling
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 127 - 131
  • [36] Application and Research of case teaching in "computer foundation"
    Qin, Jian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1979 - 1982
  • [37] Application of the WebQuest Teaching Mode in a Computer Network Course
    Zhang, Li-Hui
    Li, Zhi-Yong
    Lu, Zhi-Fang
    Li, Fei
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED EDUCATION AND MANAGEMENT (ICAEM 2016), 2016, : 291 - 295
  • [38] Application of the computer network technology in the higher mathematics teaching
    Du, Jian
    Liu, Xiaobo
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 255 - 256
  • [39] Study of Computer Network Security and Its Countermeasures
    Qian, Jun
    Guo, Song
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 2232 - 2235
  • [40] Analysis of the Application of Network Resources in the University Computer Teaching
    Liang, Haili
    INTERNATIONAL SYMPOSIUM ON ENGINEERING TECHNOLOGY, EDUCATION AND MANAGEMENT (ISETEM 2014), 2014, : 343 - 347